www[.]sitemap[.]kivvibank[.]com
Domain Security & Threat Intelligence Report
16/95 VT
Active
PD-20260219-95D654
Feb 19, 2026
74
Threat
PhishDestroy AI
HIGH
The domain www.sitemap.kivvibank.com has been identified as a phishing site, impersonating a banking service. With a VirusTotal detection score of 16 out of 95, it presents a considerable risk. Its deceptive nature aims to trick users into providing sensitive information, potentially leading to financial loss.
This domain was registered recently, only three days ago, through GMO Internet, Inc. The IP address 186.2.175.33 is linked to shared hosting, which is commonly utilized by cybercriminals for quick deployment of phishing campaigns. The rapid registration and hosting practices increase the urgency for monitoring and response.
Currently, the site is active, and PhishDestroy has taken measures by reporting the domain and is actively monitoring its status. Further actions, including blocklisting, may be enacted to mitigate the potential impact on users.
This domain was registered recently, only three days ago, through GMO Internet, Inc. The IP address 186.2.175.33 is linked to shared hosting, which is commonly utilized by cybercriminals for quick deployment of phishing campaigns. The rapid registration and hosting practices increase the urgency for monitoring and response.
Currently, the site is active, and PhishDestroy has taken measures by reporting the domain and is actively monitoring its status. Further actions, including blocklisting, may be enacted to mitigate the potential impact on users.
VirusTotal
16 Detections
URLScan.io
Domain Age
4 days Brand New!
Site Status
Active
DestroyList
Listed
Threat Response Pipeline
Discovery
Submission
Legal
Takedown
11/12
Pre-emptive Discovery & Ingestion
Global Ecosystem Submission
Legal Notifications & Reporting
Public Transparency & Takedown
Public Blocklist Status
Evidence Capture
Domain Intelligence
Domainwww.sitemap.kivvibank.com
RegistrarGMO Internet, Inc. (NL)
IP Address186.2.175.33
CreatedFeb 21, 2026 (4 days — Brand New!)
Nameserversmimi.ns.cloudflare.com
rory.ns.cloudflare.com
rory.ns.cloudflare.com
Abuse Contactsabuse@internet.gmo
abuse@iqweb.io
abuse@iqweb.io
First DetectedFeb 19, 2026
Case IDPD-20260219-95D654
Registrar Response0h
Report This Domain
Submit evidence & help protect others
VirusTotal Analysis
16 / 95 security vendors flagged this domain
View on VT
ADMINUSLabs
BitDefender
CyRadar
ESET
Emsisoft
Forcepoint ThreatSeeker
Fortinet
G-Data
Kaspersky
Lionic
Netcraft
Seclookup
Sophos
Trustwave
VIPRE
Webroot
Evidence & External Reports
Were You Affected by This Site?
You are not alone and there is nothing to be ashamed of. Scammers are sophisticated criminals who exploit trust. Reporting your experience is the most powerful weapon against fraud — your report can prevent others from becoming victims and help law enforcement take action. Silence is the scammer's greatest advantage. Break it.
If you have interacted with this domain, entered personal information, or connected a cryptocurrency wallet — take immediate action. Below are resources to help you report the incident and protect yourself.
Chainabuse
Report crypto wallet address, transaction, or phishing URL
FBI IC3
Report internet crime (US)
Europol
Report cybercrime (EU)
Action Fraud
Report fraud & cyber crime (UK)
SEAL-ISAC
Security Alliance — crypto threat intelligence
Domain Appeal
Contest this listing if false positive
Beware of recovery scammers! After being scammed, criminals may contact you again pretending to be "recovery agents," lawyers, or investigators who claim they can retrieve your lost funds — for a fee. This is a second scam. No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →
Report to Your Local Authorities
Select your country to see local cybercrime reporting contacts and complaint templates.
Select your country...
Related Domain Reports
Other Domains on 186.2.175.33
More Domains at GMO Internet, Inc.
Stay Informed, Stay Safe
Monitor live threats or contest this listing if you believe it's a false positive
URLScan Report